Search results for "Privacy"

showing 10 items of 402 documents

Fuzzy Logic Based Security Trust Evaluation for IoT Environments

2019

In the new technological era called the Internet of Things (IoT), people, machines and objects communicate with each other via the Internet by exchanging information. In this context, trust plays an important role and is considered as a key factor in the success of the IoT services expansion. IoT services and applications use in some cases data concerning the privacy of their users. Consequently, users should trust the entities exchanging their personal information. In this paper, we present a framework that evaluates the security trust level of IoT nodes based on a Fuzzy Logic model using different input parameters such as Device Physical Security, Device Security Level and Device Ownershi…

Computer scienceContext (language use)02 engineering and technology[INFO] Computer Science [cs]TrustComputer securitycomputer.software_genreFuzzy logicFuzzy LogicFactor (programming language)Node (computer science)0202 electrical engineering electronic engineering information engineeringcomputer.programming_languagePrivacy.[INFO.INFO-NI] Computer Science [cs]/Networking and Internet Architecture [cs.NI]business.industry020206 networking & telecommunicationsInternet of Things (IoT)SecurityKey (cryptography)020201 artificial intelligence & image processingThe InternetbusinessPersonally identifiable informationcomputerPhysical security2019 IEEE/ACS 16th International Conference on Computer Systems and Applications (AICCSA)
researchProduct

Experimental evaluation of privacy-preserving aggregation schemes on planetlab

2015

New pervasive technologies often reveal many sen- sitive information about users’ habits, seriously compromising the privacy and sometimes even the personal security of people. To cope with this problem, researchers have developed the idea of privacy-preserving data mining which refers to the possibility of releasing aggregate information about the data provided by multiple users, without any information leakage about individual data. These techniques have different privacy levels and communication costs, but all of them can suffer when some users’ data becomes inaccessible during the operation of the privacy preserving protocols. It is thus interesting to validate the applicability of such…

Computer sciencePrivacy softwareSettore ING-INF/03 - TelecomunicazioniAggregate (data warehouse)aggregationComputer securitycomputer.software_genreprivacySecret sharingInformation sensitivityPlanetLabInformation leakageSecure multi-party computationcomputer
researchProduct

Information flow and WOM in social media and online communities

2017

Computer sciencebusiness.industry05 social sciencesInternet privacyLibrary and Information SciencesComputer Science Applications0502 economics and business050211 marketingSocial mediaInformation flow (information theory)0509 other social sciences050904 information & library sciencesbusinessInformation SystemsOnline Information Review
researchProduct

Small worlds with a difference

2011

Political discussions on social network platforms represent an increasingly relevant source of political information, an opportunity for the exchange of opinions and a popular source of quotes for media outlets. We analyzed political communication on Twitter during the run-up to the German general election of 2009 by extracting a directed network of user interactions based on the exchange of political information and opinions. In consonance with expectations from previous research, the resulting network exhibits small-world properties, lending itself to fast and efficient information diffusion. We go on to demonstrate that precisely the highly connected nodes, characteristic for small-world…

Computer sciencebusiness.industryInternet privacyPolitical communicationFilter (signal processing)language.human_languageGermanPoliticsGeneral electionSmall worldslanguageEntropy (information theory)businessNetwork analysisProceedings of the 3rd International Web Science Conference
researchProduct

A Context-Aware Mobile Solution for Assisting Tourists in a Smart Environment

2017

Computer sciencebusiness.industryInternet privacyRecommender Systems020206 networking & telecommunicationsContext (language use)02 engineering and technologyRecommender systemContext Awareness; E-Tourism; Recommender SystemsE-Tourism020204 information systemsAdaptive system0202 electrical engineering electronic engineering information engineeringContext awarenessSmart environmentbusinessContext AwarenessProceedings of the 50th Hawaii International Conference on System Sciences (2017)
researchProduct

Security Enhancement of Peer-to-Peer Session Initiation

2012

Today, Peer-to-Peer SIP based communication systems have attracted much attention from both the academia and industry. The decentralized nature of P2P might provide the distributed peer-to-peer communication system without help of the traditional SIP server. However, the decentralization features come to the cost of the reduced manageability and create new concerns. Until now, the main focus of research was on the availability of the network and systems, while few attempts are put on protecting privacy. In this chapter, we investigate on P2PSIP security issues and introduce two enhancement solutions: central based security and distributed trust security, both of which have their own advanta…

Computer sciencebusiness.industryInternet privacySecurity enhancementSession (computer science)Peer-to-peercomputer.software_genrebusinesscomputer
researchProduct

Low-cost active cyber defence

2014

The authors of this paper investigated relatively simple active strategies against selected popular cyber threat vectors. When cyber attacks are analysed for their severity and occurrence, many incidents are usually classifi ed as minor, e.g. spam or phishing. We are interested in the various types of low-end cyber incidents (as opposed to high-end state- sponsored incidents and advanced persistent threats) for two reasons: • being the least complicated incidents, we expect to fi nd simple active response The authors analysed the proposed strategies from the security economics point of view to determine why and how these strategies might be effective. We also discuss the legal aspects of th…

Computer sciencebusiness.industryInternet privacybusinessComputer securitycomputer.software_genrePhishingcomputerCyber threats2014 6th International Conference On Cyber Conflict (CyCon 2014)
researchProduct

Performing transnational family with the affordances of mobile apps : a case study of Polish mothers living in Finland

2020

Affordances provided by digital technologies and mobile apps (WhatsApp, Skype, Messenger) help in maintaining familyhood. These mobile apps enable the creation of in-app family groups. They also afford image sharing, which is used for phatic purposes. Digital connectivity provides the illusions of togetherness and belonging, and allows for performing family in a transnational context (emotional transnationalism). However, it also generates the feelings of guilt through infrequent communication. In the auto-driven visual elicitation interviews, the study looks at family constellations and technologically mediated communication from the perspective of five Polish mothers living in Finland. Ap…

ComputerSystemsOrganization_COMPUTERSYSTEMIMPLEMENTATIONcollageGeneralLiterature_INTRODUCTORYANDSURVEYInternet privacyaffordances0507 social and economic geographyperhe-elämäGeneralLiterature_MISCELLANEOUSArts and Humanities (miscellaneous)keskinäisviestintämental disorders050602 political science & public administrationtransnationaalisuusmobiilisovelluksetSociologyAffordancetransnational familyDemographymobile appsbusiness.industryInformationSystems_INFORMATIONSYSTEMSAPPLICATIONS05 social sciencesMobile appsPolish migrantsmaahanmuuttajat0506 political sciencevisual elicitationpuolalaisetperhesuhteetbusiness050703 geography
researchProduct

Preventing problematic internet use during the COVID-19 pandemic: Consensus guidance

2020

As a response to the COVID-19 pandemic, many governments have introduced steps such as spatial distancing and “staying at home” to curb its spread and impact. The fear resulting from the disease, the ‘lockdown’ situation, high levels of uncertainty regarding the future, and financial insecurity raise the level of stress, anxiety, and depression experienced by people all around the world. Psychoactive substances and other reinforcing behaviors (e.g., gambling, video gaming, watching pornography) are often used to reduce stress and anxiety and/or to alleviate depressed mood. The tendency to use such substances and engage in such behaviors in an excessive manner as putative coping strategies i…

ConsensusDistancingSocial connectednesslcsh:RC435-571Internet privacyPneumonia Viral610 Medicine & healthAnxietyArticleSocial group03 medical and health sciences2738 Psychiatry and Mental HealthBetacoronavirus0302 clinical medicinelcsh:PsychiatryPandemicAdaptation PsychologicalmedicinePornographyHumans10064 Neuroscience Center ZurichSalut mentalPandemicsInternetbusiness.industryDepressionSARS-CoV-23203 Clinical PsychologyClinical Psychology; Psychiatry and Mental health; COVID-19COVID-1910058 Department of Child and Adolescent PsychiatryAnxiety Disorders030227 psychiatryPsychiatry and Mental healthClinical PsychologyWork (electrical)PsychologieVideo GamesInformation and Communications Technology10076 Center for Integrative Human PhysiologyAnxietyMental healthmedicine.symptomPsychologybusinessCoronavirus Infections030217 neurology & neurosurgeryComprehensive Psychiatry
researchProduct

Il consenso informato per l'effettuazione del test per la diagnosi di infezione da HIV: Come comportarsi in caso di minori

2008

AIDS is a clinical picture related to Human Immunodeficiency Virus (HIV) infection. In the last 20 years this infection has spread progressively, with approximately 2.4 million children under 15 years old now infected. The HIV antibody test is generally used to reveal the infection. In most European countries the test is voluntary; in Italy, implementation of the test is now regulated by Law 135/90. Art. 5 of the law states that the test is voluntary while informed consent is obligatory. However, nothing is stated concerning the child's consent. By contrast, other Italian laws (e.g., Law 194/78, Law 194/96 and DPR 309/90) establish that the physician should only accept the wishes of minors …

ConsentMinorMicrobiology (medical)Infectious DiseasesSettore MED/43 - Medicina LegalePrivacyConsent; HIV testing; Minor; Privacy; Microbiology (medical); Infectious DiseasesHIV testing
researchProduct